{"id":337,"date":"2018-06-20T10:58:13","date_gmt":"2018-06-20T08:58:13","guid":{"rendered":"https:\/\/www.zaskolit.cz\/?p=337"},"modified":"2018-06-20T11:45:59","modified_gmt":"2018-06-20T09:45:59","slug":"jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365","status":"publish","type":"post","link":"https:\/\/www.digitalnisebeobrana.cz\/en\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/","title":{"rendered":"How authors of scam emails bypassing Microsoft Office 365 phishing protection"},"content":{"rendered":"<p>For most fraudulent emails, most email providers use machine readers. If it finds suspicious text, such as asking for a password reset, sending a payment, or attempting to mimic a known business, the e-mail is marked as fraudulent. The authors of these emails use a technique called Dubbed ZeroFont, which tries to deceive detection. And they&#8217;re succesfull.<!--more--><\/p>\n<p>How does it work? The email author writes zero-size characters into the text. These are invisible to the user, but automatic detection does not work with the visual form of the text, it uses the source code of the email. For example, the user sees the text &#8220;\u00a9 2018 Microsoft Corporation,&#8221; but there are other words in the source code (see figure below). So the recipient of the email see the &#8220;signed&#8221; text, which would (if the email came from a different address than Microsoft) have the machine evaluated as spam, but because the source code contains another text that is not &#8220;harmful&#8221;, it considers the email to be legitimate.<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-338\" src=\"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/email-security-phishing.gif\" alt=\"\" width=\"728\" height=\"53\" \/><\/p>\n<p>Fraudulent e-mail detection systems developers are constantly improving detection mechanisms, but attackers are usually (at least) one step ahead. Some systems have learned to detect such a way of camouflage, but they mostly work with existing dictionaries &#8211; they compare the text with common words. If the phishing e-mail writer inserts such invisible text that does not contain existing words, he \/ she can get around this protection again.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-339\" src=\"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/ZeroFont_Email_zoomed.jpg\" alt=\"\" width=\"886\" height=\"117\" srcset=\"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/ZeroFont_Email_zoomed.jpg 886w, https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/ZeroFont_Email_zoomed-600x79.jpg 600w, https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/ZeroFont_Email_zoomed-300x40.jpg 300w, https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/ZeroFont_Email_zoomed-768x101.jpg 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-340\" src=\"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/zerofontmess.png\" alt=\"\" width=\"931\" height=\"73\" srcset=\"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/zerofontmess.png 931w, https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/zerofontmess-600x47.png 600w, https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/zerofontmess-300x24.png 300w, https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/zerofontmess-768x60.png 768w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/><br \/>\nAlways pay attention to the address (not the name) from which emails with the request of an action come from.<\/p>\n<p>Source: <a href=\"https:\/\/www.avanan.com\/resources\/zerofont-phishing-attack\">Avanan<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pro detekci podvodn\u00fdch email\u016f pou\u017e\u00edv\u00e1 v\u011bt\u0161ina poskytovatel\u016f emailu strojov\u00e9 \u010dten\u00ed. Pokud objev\u00ed podez\u0159el\u00fd text, nap\u0159. \u017e\u00e1dot o reset hesla, zasl\u00e1n\u00ed platby nebo pokus o napodoben\u00ed n\u011bjak\u00e9 zn\u00e1me firmy, email ozna\u010d\u00ed jako podvodn\u00fd. Auto\u0159i t\u011bchto email\u016f pou\u017e\u00edvaj\u00ed techniku zvanou Dubbed ZeroFont, kter\u00e1 se sna\u017e\u00ed detekci oklamat. A da\u0159\u00ed se jim to.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-337","post","type-post","status-publish","format-standard","hentry","category-blog"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"en","enabled_languages":["cs","en"],"languages":{"cs":{"title":true,"content":true,"excerpt":false},"en":{"title":true,"content":true,"excerpt":false}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How authors of scam emails bypassing Microsoft Office 365 phishing protection - DIGITAL SELF-DEFENSE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How authors of scam emails bypassing Microsoft Office 365 phishing protection - DIGITAL SELF-DEFENSE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/\" \/>\n<meta property=\"og:site_name\" content=\"DIGITAL SELF-DEFENSE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/digitalnisebeobrana\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/digitalnisebeobrana\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-20T08:58:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-20T09:45:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/email-security-phishing.gif\" \/>\n<meta name=\"author\" content=\"Milan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sodomak\" \/>\n<meta name=\"twitter:site\" content=\"@sodomak\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Milan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/\"},\"author\":{\"name\":\"Milan\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#\\\/schema\\\/person\\\/e932432719ebfc02a9b05e7b12047736\"},\"headline\":\"How authors of scam emails bypassing Microsoft Office 365 phishing protection\",\"datePublished\":\"2018-06-20T08:58:13+00:00\",\"dateModified\":\"2018-06-20T09:45:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/\"},\"wordCount\":590,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#\\\/schema\\\/person\\\/e932432719ebfc02a9b05e7b12047736\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zaskolit.cz\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/email-security-phishing.gif\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/\",\"url\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/\",\"name\":\"How authors of scam emails bypassing Microsoft Office 365 phishing protection - DIGITAL SELF-DEFENSE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zaskolit.cz\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/email-security-phishing.gif\",\"datePublished\":\"2018-06-20T08:58:13+00:00\",\"dateModified\":\"2018-06-20T09:45:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zaskolit.cz\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/email-security-phishing.gif\",\"contentUrl\":\"https:\\\/\\\/www.zaskolit.cz\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/email-security-phishing.gif\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jak auto\u0159i podvodn\u00fdch mail\u016f obch\u00e1zej\u00ed ochranu v Microsoft Office 365\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/\",\"name\":\"DIGITAL SELF-DEFENSE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#\\\/schema\\\/person\\\/e932432719ebfc02a9b05e7b12047736\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#\\\/schema\\\/person\\\/e932432719ebfc02a9b05e7b12047736\",\"name\":\"Milan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo.png\",\"url\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo.png\",\"width\":613,\"height\":73,\"caption\":\"Milan\"},\"logo\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo.png\"},\"description\":\"Jmenuji se Milan P\u016flkr\u00e1bek, pamatuji si po\u010d\u00edta\u010de bez internetu, Internet bez Google a mobiln\u00ed komunikaci bez \u0161ifrov\u00e1n\u00ed. M\u00e1m za sebou v\u00edce ne\u017e dvacet let profesion\u00e1ln\u00ed praxe v IT, p\u0159edn\u00e1\u0161\u00edm a p\u00ed\u0161u \u010dl\u00e1nky o IT bezpe\u010dnosti, kryptom\u011bn\u00e1ch a nov\u00fdch technologi\u00edch. Od roku 2014 jsem sou\u010d\u00e1st\u00ed nezikov\u00e9 organizace Paraleln\u00ed Polis v Praze.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/digitalnisebeobrana\\\/\",\"https:\\\/\\\/x.com\\\/sodomak\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How authors of scam emails bypassing Microsoft Office 365 phishing protection - DIGITAL SELF-DEFENSE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/","og_locale":"en_US","og_type":"article","og_title":"How authors of scam emails bypassing Microsoft Office 365 phishing protection - DIGITAL SELF-DEFENSE","og_url":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/","og_site_name":"DIGITAL SELF-DEFENSE","article_publisher":"https:\/\/www.facebook.com\/digitalnisebeobrana\/","article_author":"https:\/\/www.facebook.com\/digitalnisebeobrana\/","article_published_time":"2018-06-20T08:58:13+00:00","article_modified_time":"2018-06-20T09:45:59+00:00","og_image":[{"url":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/email-security-phishing.gif","type":"","width":"","height":""}],"author":"Milan","twitter_card":"summary_large_image","twitter_creator":"@sodomak","twitter_site":"@sodomak","twitter_misc":{"Written by":"Milan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/#article","isPartOf":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/"},"author":{"name":"Milan","@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#\/schema\/person\/e932432719ebfc02a9b05e7b12047736"},"headline":"How authors of scam emails bypassing Microsoft Office 365 phishing protection","datePublished":"2018-06-20T08:58:13+00:00","dateModified":"2018-06-20T09:45:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/"},"wordCount":590,"commentCount":0,"publisher":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#\/schema\/person\/e932432719ebfc02a9b05e7b12047736"},"image":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/email-security-phishing.gif","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/","url":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/","name":"How authors of scam emails bypassing Microsoft Office 365 phishing protection - DIGITAL SELF-DEFENSE","isPartOf":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/email-security-phishing.gif","datePublished":"2018-06-20T08:58:13+00:00","dateModified":"2018-06-20T09:45:59+00:00","breadcrumb":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/#primaryimage","url":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/email-security-phishing.gif","contentUrl":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/email-security-phishing.gif"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalnisebeobrana.cz\/jak-autori-podvodnych-mailu-obchazeji-ochranu-v-microsoft-office-365\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.digitalnisebeobrana.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Jak auto\u0159i podvodn\u00fdch mail\u016f obch\u00e1zej\u00ed ochranu v Microsoft Office 365"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#website","url":"https:\/\/www.digitalnisebeobrana.cz\/en\/","name":"DIGITAL SELF-DEFENSE","description":"","publisher":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#\/schema\/person\/e932432719ebfc02a9b05e7b12047736"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalnisebeobrana.cz\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#\/schema\/person\/e932432719ebfc02a9b05e7b12047736","name":"Milan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2022\/01\/logo.png","url":"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2022\/01\/logo.png","contentUrl":"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2022\/01\/logo.png","width":613,"height":73,"caption":"Milan"},"logo":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2022\/01\/logo.png"},"description":"Jmenuji se Milan P\u016flkr\u00e1bek, pamatuji si po\u010d\u00edta\u010de bez internetu, Internet bez Google a mobiln\u00ed komunikaci bez \u0161ifrov\u00e1n\u00ed. M\u00e1m za sebou v\u00edce ne\u017e dvacet let profesion\u00e1ln\u00ed praxe v IT, p\u0159edn\u00e1\u0161\u00edm a p\u00ed\u0161u \u010dl\u00e1nky o IT bezpe\u010dnosti, kryptom\u011bn\u00e1ch a nov\u00fdch technologi\u00edch. Od roku 2014 jsem sou\u010d\u00e1st\u00ed nezikov\u00e9 organizace Paraleln\u00ed Polis v Praze.","sameAs":["https:\/\/www.facebook.com\/digitalnisebeobrana\/","https:\/\/x.com\/sodomak"]}]}},"_links":{"self":[{"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/posts\/337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/comments?post=337"}],"version-history":[{"count":7,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/posts\/337\/revisions"}],"predecessor-version":[{"id":415,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/posts\/337\/revisions\/415"}],"wp:attachment":[{"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/media?parent=337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/categories?post=337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/tags?post=337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}